WO1999033270A1 - Procede pour securiser un systeme protege par une hierarchie cryptographique - Google Patents

Procede pour securiser un systeme protege par une hierarchie cryptographique Download PDF

Info

Publication number
WO1999033270A1
WO1999033270A1 PCT/EP1997/007124 EP9707124W WO9933270A1 WO 1999033270 A1 WO1999033270 A1 WO 1999033270A1 EP 9707124 W EP9707124 W EP 9707124W WO 9933270 A1 WO9933270 A1 WO 9933270A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
cryptographic
assigned
subsets
cryptographic keys
Prior art date
Application number
PCT/EP1997/007124
Other languages
German (de)
English (en)
Inventor
Jörg Schwenk
Original Assignee
Deutsche Telekom Ag
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to DE19649292A priority Critical patent/DE19649292A1/de
Priority to US08/990,446 priority patent/US6222923B1/en
Application filed by Deutsche Telekom Ag filed Critical Deutsche Telekom Ag
Priority to EP97953855A priority patent/EP1040662B1/fr
Priority to CA002310406A priority patent/CA2310406A1/fr
Priority to DE59710287T priority patent/DE59710287D1/de
Priority to AT97953855T priority patent/ATE242949T1/de
Priority to PCT/EP1997/007124 priority patent/WO1999033270A1/fr
Priority to JP2000526050A priority patent/JP4351386B2/ja
Priority to ES97953855T priority patent/ES2201341T3/es
Publication of WO1999033270A1 publication Critical patent/WO1999033270A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/442Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
    • H04N21/44236Monitoring of piracy processes or activities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • H04L9/0836Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/436Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
    • H04N21/4367Establishing a secure communication between the client and a peripheral device or smart card
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible
    • H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/606Traitor tracing

Definitions

  • Each key hierarchy has at least a higher hierarchy level of cryptographic keys.
  • a higher hierarchical level is formed in that the cryptographic keys of the immediately lower hierarchical level are combined in any manner to form several subsets of a predetermined size, each subset being assigned a cryptographic key which is generated from the cryptographic keys forming the respective subset and then in the storage device is filed. Then at least one individual cryptographic key assigned to a suspicious user is determined by forming the intersection of at least two predetermined subsets that belong to the same hierarchical level of different key hierarchies.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Storage Device Security (AREA)
  • Signal Processing Not Specific To The Method Of Recording And Reproducing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé pour sécuriser au moins un système protégé par une hiérarchie prédéfinie de clés de chiffrement, notamment un système de télévision à péage, contre un usage illicite. Les systèmes de hiérarchie cryptographique actuels ne permettent pas la détection d'un usager douteux qui contrefait une clé de groupe transmise par l'exploitant d'un système et la divulgue à des tierces personnes. La solution proposée par l'invention consiste à détecter au moins une clé de chiffrement individuelle attribuée à un usager douteux, en formant l'intersection d'au moins deux sous-ensembles prédéterminés constitués à différents moments et appartenant au même niveau hiérarchique.
PCT/EP1997/007124 1996-11-28 1997-12-18 Procede pour securiser un systeme protege par une hierarchie cryptographique WO1999033270A1 (fr)

Priority Applications (9)

Application Number Priority Date Filing Date Title
DE19649292A DE19649292A1 (de) 1996-11-28 1996-11-28 Verfahren zum Sichern eines durch eine Schlüsselhierarchie geschützten Systems
US08/990,446 US6222923B1 (en) 1996-11-28 1997-12-15 Method for securing system protected by a key hierarchy
EP97953855A EP1040662B1 (fr) 1996-11-28 1997-12-18 Procede pour securiser un systeme protege par une hierarchie cryptographique
CA002310406A CA2310406A1 (fr) 1996-11-28 1997-12-18 Procede pour securiser un systeme protege par une hierarchie cryptographique
DE59710287T DE59710287D1 (de) 1996-11-28 1997-12-18 Verfahren zum sichern eines durch eine schlüsselhierarchie geschützten systems
AT97953855T ATE242949T1 (de) 1996-11-28 1997-12-18 Verfahren zum sichern eines durch eine schlüsselhierarchie geschützten systems
PCT/EP1997/007124 WO1999033270A1 (fr) 1996-11-28 1997-12-18 Procede pour securiser un systeme protege par une hierarchie cryptographique
JP2000526050A JP4351386B2 (ja) 1996-11-28 1997-12-18 キー階層により保護されたシステムを安全保護する方法
ES97953855T ES2201341T3 (es) 1996-11-28 1997-12-18 Procedimiento para proteger un sistema protegido por una jerarquia de claves criptograficas.

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE19649292A DE19649292A1 (de) 1996-11-28 1996-11-28 Verfahren zum Sichern eines durch eine Schlüsselhierarchie geschützten Systems
US08/990,446 US6222923B1 (en) 1996-11-28 1997-12-15 Method for securing system protected by a key hierarchy
PCT/EP1997/007124 WO1999033270A1 (fr) 1996-11-28 1997-12-18 Procede pour securiser un systeme protege par une hierarchie cryptographique

Publications (1)

Publication Number Publication Date
WO1999033270A1 true WO1999033270A1 (fr) 1999-07-01

Family

ID=27216876

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP1997/007124 WO1999033270A1 (fr) 1996-11-28 1997-12-18 Procede pour securiser un systeme protege par une hierarchie cryptographique

Country Status (8)

Country Link
US (1) US6222923B1 (fr)
EP (1) EP1040662B1 (fr)
JP (1) JP4351386B2 (fr)
AT (1) ATE242949T1 (fr)
CA (1) CA2310406A1 (fr)
DE (2) DE19649292A1 (fr)
ES (1) ES2201341T3 (fr)
WO (1) WO1999033270A1 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002060118A2 (fr) * 2001-01-26 2002-08-01 International Business Machines Corporation Procede permettant de reperer des recepteurs espions dans un systeme de chiffrement de diffusion
CN1303777C (zh) * 2001-01-26 2007-03-07 国际商业机器公司 无状态接收机的广播加密和密钥撤销方法
US9520993B2 (en) 2001-01-26 2016-12-13 International Business Machines Corporation Renewable traitor tracing

Families Citing this family (66)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ATE325478T1 (de) * 1998-01-02 2006-06-15 Cryptography Res Inc Leckresistentes kryptographisches verfahren und vorrichtung
US7587044B2 (en) * 1998-01-02 2009-09-08 Cryptography Research, Inc. Differential power analysis method and apparatus
EP1090480B1 (fr) * 1998-06-03 2019-01-09 Cryptography Research, Inc. Perfectionnement de normes cryptographiques et autres procedes cryptographiques a reduction des fuites pour cartes a puces et autres systemes cryptographiques
CA2334597C (fr) * 1998-07-02 2007-09-04 Cryptography Research, Inc. Mise a jour a cle de chiffrage indexee a resistance de fuite
DE19847941A1 (de) * 1998-10-09 2000-04-13 Deutsche Telekom Ag Verfahren zum Etablieren eines gemeinsamen krytografischen Schlüssels für n Teilnehmer
US6735313B1 (en) * 1999-05-07 2004-05-11 Lucent Technologies Inc. Cryptographic method and apparatus for restricting access to transmitted programming content using hash functions and program identifiers
US7013484B1 (en) 2000-03-31 2006-03-14 Intel Corporation Managing a secure environment using a chipset in isolated execution mode
US7194634B2 (en) * 2000-03-31 2007-03-20 Intel Corporation Attestation key memory device and bus
US6957332B1 (en) * 2000-03-31 2005-10-18 Intel Corporation Managing a secure platform using a hierarchical executive architecture in isolated execution mode
US6760441B1 (en) * 2000-03-31 2004-07-06 Intel Corporation Generating a key hieararchy for use in an isolated execution environment
US7073071B1 (en) 2000-03-31 2006-07-04 Intel Corporation Platform and method for generating and utilizing a protected audit log
US7013481B1 (en) 2000-03-31 2006-03-14 Intel Corporation Attestation key memory device and bus
US6769058B1 (en) 2000-03-31 2004-07-27 Intel Corporation Resetting a processor in an isolated execution environment
US6934817B2 (en) * 2000-03-31 2005-08-23 Intel Corporation Controlling access to multiple memory zones in an isolated execution environment
US6754815B1 (en) 2000-03-31 2004-06-22 Intel Corporation Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set
CN1389043B (zh) * 2000-06-21 2010-09-29 索尼公司 信息处理装置及处理方法
US6976162B1 (en) * 2000-06-28 2005-12-13 Intel Corporation Platform and method for establishing provable identities while maintaining privacy
US7793111B1 (en) 2000-09-28 2010-09-07 Intel Corporation Mechanism to handle events in a machine with isolated execution
US7035963B2 (en) * 2000-12-27 2006-04-25 Intel Corporation Method for resolving address space conflicts between a virtual machine monitor and a guest operating system
US7818808B1 (en) 2000-12-27 2010-10-19 Intel Corporation Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor
US6907600B2 (en) 2000-12-27 2005-06-14 Intel Corporation Virtual translation lookaside buffer
US20030068047A1 (en) * 2001-09-28 2003-04-10 Lee David A. One-way broadcast key distribution
US7024555B2 (en) 2001-11-01 2006-04-04 Intel Corporation Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment
US7340603B2 (en) * 2002-01-30 2008-03-04 Sony Corporation Efficient revocation of receivers
US7631196B2 (en) * 2002-02-25 2009-12-08 Intel Corporation Method and apparatus for loading a trustable operating system
US7069442B2 (en) 2002-03-29 2006-06-27 Intel Corporation System and method for execution of a secured environment initialization instruction
US7139890B2 (en) 2002-04-30 2006-11-21 Intel Corporation Methods and arrangements to interface memory
US6820177B2 (en) * 2002-06-12 2004-11-16 Intel Corporation Protected configuration space in a protected environment
US7142674B2 (en) * 2002-06-18 2006-11-28 Intel Corporation Method of confirming a secure key exchange
GB2394803A (en) * 2002-10-31 2004-05-05 Hewlett Packard Co Management of security key distribution using an ancestral hierarchy
US7165181B2 (en) * 2002-11-27 2007-01-16 Intel Corporation System and method for establishing trust without revealing identity
US20040117532A1 (en) * 2002-12-11 2004-06-17 Bennett Steven M. Mechanism for controlling external interrupts in a virtual machine system
US20040128345A1 (en) * 2002-12-27 2004-07-01 Robinson Scott H. Dynamic service registry
US7900017B2 (en) 2002-12-27 2011-03-01 Intel Corporation Mechanism for remapping post virtual machine memory pages
US7076802B2 (en) * 2002-12-31 2006-07-11 Intel Corporation Trusted system clock
US7062048B2 (en) 2003-01-27 2006-06-13 Wegener Communications, Inc. Apparatus and method for single encryption with multiple authorization of distributed content data
US7206411B2 (en) 2003-06-25 2007-04-17 Wegener Communications, Inc. Rapid decryption of data by key synchronization and indexing
US7415708B2 (en) * 2003-06-26 2008-08-19 Intel Corporation Virtual machine management using processor state information
US20050044292A1 (en) * 2003-08-19 2005-02-24 Mckeen Francis X. Method and apparatus to retain system control when a buffer overflow attack occurs
US7739521B2 (en) * 2003-09-18 2010-06-15 Intel Corporation Method of obscuring cryptographic computations
US7610611B2 (en) * 2003-09-19 2009-10-27 Moran Douglas R Prioritized address decoder
US20050080934A1 (en) 2003-09-30 2005-04-14 Cota-Robles Erik C. Invalidating translation lookaside buffer entries in a virtual machine (VM) system
US7177967B2 (en) * 2003-09-30 2007-02-13 Intel Corporation Chipset support for managing hardware interrupts in a virtual machine system
US8156343B2 (en) 2003-11-26 2012-04-10 Intel Corporation Accessing private data about the state of a data processing machine from storage that is publicly accessible
US8037314B2 (en) 2003-12-22 2011-10-11 Intel Corporation Replacing blinded authentication authority
US20050152539A1 (en) * 2004-01-12 2005-07-14 Brickell Ernie F. Method of protecting cryptographic operations from side channel attacks
US7802085B2 (en) 2004-02-18 2010-09-21 Intel Corporation Apparatus and method for distributing private keys to an entity with minimal secret, unique information
US20050216920A1 (en) * 2004-03-24 2005-09-29 Vijay Tewari Use of a virtual machine to emulate a hardware device
US7356735B2 (en) * 2004-03-30 2008-04-08 Intel Corporation Providing support for single stepping a virtual machine in a virtual machine environment
US7620949B2 (en) 2004-03-31 2009-11-17 Intel Corporation Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment
JP4162237B2 (ja) * 2004-06-24 2008-10-08 インターナショナル・ビジネス・マシーンズ・コーポレーション 複数の復号化装置に対し選択的にメッセージを配信する暗号化通信システム、暗号化装置、復号化装置、暗号化方法、復号化方法、暗号化プログラム、及び復号化プログラム
US20050288056A1 (en) * 2004-06-29 2005-12-29 Bajikar Sundeep M System including a wireless wide area network (WWAN) module with an external identity module reader and approach for certifying the WWAN module
US7305592B2 (en) * 2004-06-30 2007-12-04 Intel Corporation Support for nested fault in a virtual machine environment
DE102004042094B3 (de) * 2004-08-30 2005-09-22 RUHR-UNIVERSITäT BOCHUM Datenübertragungsverfahren und Datenübertragungsanordung
US7840962B2 (en) * 2004-09-30 2010-11-23 Intel Corporation System and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time
US8146078B2 (en) * 2004-10-29 2012-03-27 Intel Corporation Timer offsetting mechanism in a virtual machine environment
US8924728B2 (en) * 2004-11-30 2014-12-30 Intel Corporation Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information
US7840010B2 (en) * 2004-12-21 2010-11-23 Shield Security Systems, Llc Interactive security control system with conflict checking
US8533777B2 (en) 2004-12-29 2013-09-10 Intel Corporation Mechanism to determine trust of out-of-band management agents
US7395405B2 (en) * 2005-01-28 2008-07-01 Intel Corporation Method and apparatus for supporting address translation in a virtual machine environment
US7809957B2 (en) 2005-09-29 2010-10-05 Intel Corporation Trusted platform module for generating sealed data
KR100916228B1 (ko) 2006-02-28 2009-09-08 엘지전자 주식회사 페이 퍼 뷰 및 서비스 기반 방송 가입자를 위한 sek와pek의 관리 방법 및 그 통신 시스템
US8014530B2 (en) 2006-03-22 2011-09-06 Intel Corporation Method and apparatus for authenticated, recoverable key distribution with no database secrets
CN101473626B (zh) * 2006-06-22 2013-09-18 皇家飞利浦电子股份有限公司 分级确定性成对密钥预分发方案
US20080065751A1 (en) * 2006-09-08 2008-03-13 International Business Machines Corporation Method and computer program product for assigning ad-hoc groups
KR101321401B1 (ko) 2007-02-02 2013-10-25 재단법인서울대학교산학협력재단 그룹 키 관리 방법 및 이를 이용한 그룹 키 관리 장치

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3124150A1 (de) * 1980-06-19 1982-03-18 Oak Industries Inc., 16935 Rancho Bernardo, Calif. Zwei-ebenen-verschluesselungs-system fuer rf-signale
US4771459A (en) * 1985-04-29 1988-09-13 U.S. Philips Corp. System for storing and distributing keys for cryptographically protected communication
EP0506435A2 (fr) * 1991-03-29 1992-09-30 Scientific-Atlanta, Inc. Module de sécurité indépendant et externe pour un décodeur de signaux de télévision qui est extensible numériquement
DE19511298A1 (de) * 1995-03-28 1996-10-02 Deutsche Telekom Ag Verfahren zur Erteilung und zum Entzug der Berechtigung zum Empfang von Rundfunksendungen und Decoder

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4309569A (en) * 1979-09-05 1982-01-05 The Board Of Trustees Of The Leland Stanford Junior University Method of providing digital signatures
US4531020A (en) * 1982-07-23 1985-07-23 Oak Industries Inc. Multi-layer encryption system for the broadcast of encrypted information
US4613901A (en) * 1983-05-27 1986-09-23 M/A-Com Linkabit, Inc. Signal encryption and distribution system for controlling scrambling and selective remote descrambling of television signals
DE3432653C1 (de) * 1984-09-05 1986-01-16 Westdeutscher Rundfunk, Anstalt des öffentlichen Rechts, 5000 Köln Verfahren zum Übertragen von Fersehprogrammen an berechtigte Teilnehmer
FR2613565B1 (fr) * 1987-04-03 1989-06-23 Bull Cps Procede pour acheminer des cles secretes vers des modules de securite et des cartes utilisateurs, dans un reseau de traitement d'informations
DE3827172A1 (de) * 1987-08-13 1989-03-16 Peter Elsner Einrichtung zur identifizierung von nachrichten
US4888801A (en) * 1988-05-02 1989-12-19 Motorola, Inc. Hierarchical key management system
US5220604A (en) * 1990-09-28 1993-06-15 Digital Equipment Corporation Method for performing group exclusion in hierarchical group structures
JPH06141004A (ja) * 1992-10-27 1994-05-20 Mitsubishi Corp 課金システム
DE4326590C1 (de) * 1993-08-07 1994-10-20 Inst Rundfunktechnik Gmbh Verfahren zum Sperren oder der Wiedergabe bestimmter Programme in einem Fernsehempfänger oder ihrer Aufzeichnung in einem Videorecorder
US5432852A (en) * 1993-09-29 1995-07-11 Leighton; Frank T. Large provably fast and secure digital signature schemes based on secure hash functions

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3124150A1 (de) * 1980-06-19 1982-03-18 Oak Industries Inc., 16935 Rancho Bernardo, Calif. Zwei-ebenen-verschluesselungs-system fuer rf-signale
US4771459A (en) * 1985-04-29 1988-09-13 U.S. Philips Corp. System for storing and distributing keys for cryptographically protected communication
EP0506435A2 (fr) * 1991-03-29 1992-09-30 Scientific-Atlanta, Inc. Module de sécurité indépendant et externe pour un décodeur de signaux de télévision qui est extensible numériquement
DE19511298A1 (de) * 1995-03-28 1996-10-02 Deutsche Telekom Ag Verfahren zur Erteilung und zum Entzug der Berechtigung zum Empfang von Rundfunksendungen und Decoder

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
LEIN HARN ET AL: "A CRYPTOGRAPHIC KEY GENERATION SCHEME FOR MULTILEVEL DATA SECURITY", 1 October 1990, COMPUTERS & SECURITY INTERNATIONAL JOURNAL DEVOTED TO THE STUDY OF TECHNICAL AND FINANCIAL ASPECTS OF COMPUTER SECURITY, VOL. 9, NR. 6, PAGE(S) 539 - 546, XP000162681 *
SANTOSH CHOKHANI: "TOWARD A NATINAL PUBLIC KEY INFRASTRUCTURE", IEEE COMMUNICATIONS MAGAZINE, vol. 32, no. 9, 1 September 1994 (1994-09-01), pages 70 - 74, XP000476557 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002060118A2 (fr) * 2001-01-26 2002-08-01 International Business Machines Corporation Procede permettant de reperer des recepteurs espions dans un systeme de chiffrement de diffusion
WO2002060118A3 (fr) * 2001-01-26 2002-09-19 Ibm Procede permettant de reperer des recepteurs espions dans un systeme de chiffrement de diffusion
US7010125B2 (en) 2001-01-26 2006-03-07 Interntional Business Machines Corporation Method for tracing traitor receivers in a broadcast encryption system
CN1303777C (zh) * 2001-01-26 2007-03-07 国际商业机器公司 无状态接收机的广播加密和密钥撤销方法
CN1310463C (zh) * 2001-01-26 2007-04-11 国际商业机器公司 在广播加密系统中跟踪叛徒接收机的方法
US7698551B2 (en) 2001-01-26 2010-04-13 International Business Machines Corporation Method for broadcast encryption and key revocation of stateless receivers
US9520993B2 (en) 2001-01-26 2016-12-13 International Business Machines Corporation Renewable traitor tracing
US11108569B2 (en) 2001-01-26 2021-08-31 International Business Machines Corporation Renewable traitor tracing

Also Published As

Publication number Publication date
DE59710287D1 (de) 2003-07-17
JP2001527349A (ja) 2001-12-25
US6222923B1 (en) 2001-04-24
EP1040662A1 (fr) 2000-10-04
CA2310406A1 (fr) 1999-07-01
DE19649292A1 (de) 1998-06-04
JP4351386B2 (ja) 2009-10-28
ATE242949T1 (de) 2003-06-15
EP1040662B1 (fr) 2003-06-11
ES2201341T3 (es) 2004-03-16

Similar Documents

Publication Publication Date Title
EP1040662B1 (fr) Procede pour securiser un systeme protege par une hierarchie cryptographique
DE2824135C2 (fr)
DE19511298B4 (de) Verfahren zur Erteilung und zum Entzug der Berechtigung zum Empfang von Rundfunksendungen und Decoder
DE69834396T2 (de) Sicheres Datensignalübertragungssystem
DE3036596A1 (de) Verfahren zum gesicherten abwickeln eines geschaeftsvorganges ueber einen ungesicherten nachrichtenkanal
DE2439116A1 (de) Verfahren und vorrichtung zum verzerren und entzerren von uebertragungssignalen
DE2855787A1 (de) Digitalsignatureinrichtung
DE102017209014A1 (de) Verfahren und Vorrichtung zum Anfügen von Transaktionen an eine Blockkette
EP0768773B1 (fr) Procédé pour établir une clé commune pour personnes autorisées, utilisant un schéma cryptographique à seuil
DE19750779C1 (de) Verfahren zum Identifizieren von Verrätern proprietärer Daten
DE69729685T2 (de) Verfahren zur Verdeckung eines Geheimcodes in einer Rechnerbeglaubigungsvorrichtung
EP0386677B1 (fr) Méthode de génération d'un nombre aléatoire pour la communication chiffrée de données, en utilisant un nombre de départ variable
DE2350288A1 (de) Drahtfunksystem
WO2009103365A1 (fr) Procédé de communication poste à poste sans risque de manipulation, d'écoute ou de piratage dans des réseaux de plusieurs abonnés
EP0948193B1 (fr) Procédé pour l'insertion d'empreintes digitales numériques avec sécurité de manipulation dans des documents électroniques
DE2304925B2 (de) Schaltungsanordnung für eine rechnergesteuerte Fernsprech-Vermittlu ngsanlage
EP0765550A1 (fr) Dispositif de dechiffrement d'algorithmes de dechiffrement et procede pour le chiffrement et le dechiffrement au moyen d'un tel dispositif
DE3439120A1 (de) Verfahren zur identifizierung einer teilnehmerstation eines fernmeldenetzes
DE4420967C2 (de) Entschlüsselungseinrichtung von digitalen Informationen und Verfahren zur Durchführung der Ver- und Entschlüsselung dieser mit Hilfe der Entschlüsselungseinrichtung
WO2002063824A1 (fr) Protocole, systeme et dispositifs de telecommunication pour effectuer un vote electronique de maniere anonyme et authentique
DE102017211201A1 (de) Verfahren zum asymmetrischen Schlüsselmanagement und sicherheitsrelevante Anlage
DE4416253B4 (de) Verfahren zur datenschutzgerechten Verteilung von Schlüsselinformationen
DE1437515A1 (de) Schaltungsanordnung fuer zentralgesteuerte Fernsprechvermittlungsanlagen
DE3417421A1 (de) Verfahren zur missbrauchsverhinderung in fernmeldenetzen, insbesondere mobilfunknetzen
EP0763802A2 (fr) Procédé d'authentication psychométrique

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): CA CN JP KR TR

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE

WWE Wipo information: entry into national phase

Ref document number: 1997953855

Country of ref document: EP

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
ENP Entry into the national phase

Ref document number: 2310406

Country of ref document: CA

Ref country code: CA

Ref document number: 2310406

Kind code of ref document: A

Format of ref document f/p: F

NENP Non-entry into the national phase

Ref country code: KR

WWP Wipo information: published in national office

Ref document number: 1997953855

Country of ref document: EP

WWG Wipo information: grant in national office

Ref document number: 1997953855

Country of ref document: EP